1 Q. Yan., "Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks" 900-908, 2012
2 H. Redwan., "Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks" 3-9, 2008
3 Y. -C. Liang., "Sensing throughput tradeoff for cognitive radio networks" 7 (7): 1326-1337, 2008
4 M. Jo., "Selfish attacks and detection in cognitive radio ad-hoc networks" 27 (27): 46-50, 2013
5 A. Min., "Secure cooperative sensing in IEEE 802. 22 WRANS using shadow fading correlation" 10 (10): 1434-1447, 2011
6 Kun Zeng., "Reputation-based cooperative spectrum sensing with trusted nodes assistance" 14 (14): 226-228, 2010
7 Xiaoge Huang., "Quasi-Nash Equilibria for Non-Convex Distributed Power Allocation Games in Cognitive Radios" 12 (12): 3326-3337, 2013
8 Xu Yongjun., "Optimal power allocation for multiuser underlay cognitive radio networks under QoS and interference temperature constraints" 10 (10): 91-100, 2013
9 E. Björnson., "Optimal design of energy-efficient multi-user MIMO systems : Is massive MIMO the answer?" 14 (14): 3059-3075, 2015
10 Xiaoge Huang., "Non-cooperative power allocation game with imperfect sensing information for cognitive radio" 1666-1671, 2012
1 Q. Yan., "Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks" 900-908, 2012
2 H. Redwan., "Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks" 3-9, 2008
3 Y. -C. Liang., "Sensing throughput tradeoff for cognitive radio networks" 7 (7): 1326-1337, 2008
4 M. Jo., "Selfish attacks and detection in cognitive radio ad-hoc networks" 27 (27): 46-50, 2013
5 A. Min., "Secure cooperative sensing in IEEE 802. 22 WRANS using shadow fading correlation" 10 (10): 1434-1447, 2011
6 Kun Zeng., "Reputation-based cooperative spectrum sensing with trusted nodes assistance" 14 (14): 226-228, 2010
7 Xiaoge Huang., "Quasi-Nash Equilibria for Non-Convex Distributed Power Allocation Games in Cognitive Radios" 12 (12): 3326-3337, 2013
8 Xu Yongjun., "Optimal power allocation for multiuser underlay cognitive radio networks under QoS and interference temperature constraints" 10 (10): 91-100, 2013
9 E. Björnson., "Optimal design of energy-efficient multi-user MIMO systems : Is massive MIMO the answer?" 14 (14): 3059-3075, 2015
10 Xiaoge Huang., "Non-cooperative power allocation game with imperfect sensing information for cognitive radio" 1666-1671, 2012
11 P. Kaligineedi., "Malicious user detection in a cognitive radio cooperative sensing system" 9 (9): 2488-2497, 2010
12 L. Anselin, "Local indicators of spatial association—LISA" 27 (27): 93-115, 1995
13 G. Ding., "Kernel-based learning for statistical signal processing in cognitive radio networks : Theoretical foundations, example applications, and future directions" 30 (30): 126-136, 2013
14 S. Singh., "Interference management in cognitive radio systems —A convex optimization approach" 1884-1889, 2012
15 Xiaoge Huang., "Dynamic Base Station Assignment and Resource Allocation in MIMO CR Small-cell Networks" 61-65, 2014
16 F. Ahmed., "Distributed power allocation in cognitive radio networks under network power constraint" 492-497, 2014
17 R. Chen., "Defense against primary user emulation attacks in cognitive radio networks" 26 (26): 25-37, 2008
18 J. Mitola., "Cognitive radio : Making software radios more personal" 6 (6): 13-18, 1999
19 W. Saad., "Coalitional game theory for communication networks" 26 (26): 77-97, 2009
20 W. Saad., "Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks" 2114-2122, 2009
21 Xiaoge Huang., "Coalition formation based malicious user detection scheme in cognitive radio networks" 1415-1419, 2015
22 L. Zhang., "Byzantine Attack and Defense in Cognitive Radio Networks : A Survey" 17 (17): 1342-1363, 2015
23 A. Vempaty., "Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing" 1310-1315, 2011
24 C. S. Hyder., "ARC : Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks" 13 (13): 1707-1719, 2014
25 Changlong Chen., "A robust malicious user detection scheme in cooperative spectrum sensing" 4856-4861, 2012
26 K. Apt., "A generic approach to coalition formation" 11 (11): 347-367, 2009
27 P. D. Mankar., "A centralized method for optimal power allocation in cognitive radio networks" 385-390, 2013
28 A. G. Fragkiadakis., "A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks" 15 (15): 428-445, 2013